The subject disclosure pertains to transparent communications in an industrial automation environment amongst automation system components. PLC modules can be provided with unique network addresses such as IP addresses and accessed over a network using those addresses. The actual protocol and route employed to communicate with the PLC modules need not be known to a client system in order to access the PLC modules. industrial control system configurations can be modified and expanded without affecting the client system ability to function in the environment.
|
1. An industrial control system comprising:
a network module component communicatively coupled to an industrial device the network module component further communicates to an internet, the industrial device has a globally unique network address that is self-assigned by the industrial device based upon at least one of a type or function of the industrial device, wherein at least a portion of the globally unique network address provides an indication of the at least one of a type or function of the industrial device; and
a security component that controls access to the industrial device through the network module.
8. A method of network access in an industrial controller environment comprising:
communicating with at least one industrial control device over a backplane, wherein the industrial control device has a globally unique identifier that is self-assigned by the industrial control device based upon at least one of a type or function of the industrial control device, wherein at least a portion of the globally unique network address provides an indication of the at least one of a type or function of the industrial control device;
communicating with a remote system via a tcp/IP network using the globally unique network identifier; and
authenticating communications between the remote system and the services on the industrial control device based upon the globally unique identifier.
12. An industrial control system comprising:
an industrial control device communicatively coupled to a backplane, wherein the industrial control device comprises a globally unique internet address that is self-assigned by the industrial control device based upon at least one of a type or function of the industrial control device, wherein at least a portion of the globally unique internet address provides an indication of the at least one of a type or function of the industrial control device; and
a network interface component communicatively coupled to the backplane, wherein the network interface communicates to the internet, the network interface routes message over the backplane from the internet to the industrial control device and from the industrial control device to the internet based upon the globally unique internet address.
2. The system of
4. The system of
6. The system of
7. The system of
9. The method of
11. A computer readable medium having stored thereon computer executable instructions for carrying out the method of
13. The system of
|
The subject invention relates generally to industrial control systems and more particularly to a system and methodology for transparent communication in an industrial control system.
Industrial control systems have enabled modem factories to become partially or completely automated in many circumstances. These systems generally include a plurality of input and output (I/O) modules that interface at a device level to switches, contactors, relays and solenoids along with analog control to provide more complex functions such as proportional, integral and derivative (PID) control. Communications have also been integrated within the systems, whereby many industrial controllers can communicate via network technologies such as Ethernet, ControlNet, DeviceNet or other network protocols and also communicate to higher level computing systems. Generally, industrial controllers utilize the aforementioned technologies along with other technology to control, cooperate and communicate across multiple and diverse applications.
At the core of the industrial control system, is a logic processor such as a programmable logic controller (PLC). Programmable logic controllers are programmed by systems designers to operate manufacturing processes via user-designed logic programs or user programs. The user programs are stored in memory and generally executed by the PLC in a sequential manner although instruction jumping, looping and interrupt routines, for example, are also common. Associated with the user program are a plurality of memory elements or variables that provide dynamics to PLC operations and programs. These variables can be user-defined and can be defined as bits, bytes, words, integers, floating point numbers, timers, counters and/or other data types to name but a few examples.
Industrial controllers and associated control systems have increasingly become more sophisticated and complicated as control applications have been distributed across the plant floor and in many cases across geographical or physical boundaries. As an example, multiple controllers and/or other devices may communicate and cooperate to control one or more aspects of an overall manufacturing process via a network, whereas other devices may be remotely located, yet still contribute to the same process. In other words, control applications have become less centrally located on a singular control system having associated responsibilities for an entire operation. Thus, distribution of the overall control function and/or process frequently occurs across many control components, systems or devices.
The following presents a simplified summary in order to provide a basic understanding of some aspects of the claimed subject matter. This summary is not an extensive overview. It is not intended to identify key/critical elements or to delineate the scope of the claimed subject matter. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is presented later.
Briefly described, the provided subject matter concerns industrial automation systems and the communications therein utilizing a communications network. This is achieved by assigning industrial control devices (e.g., PLCs, PLC I/O modules, PLC program modules, Human Machine Interfaces, sensors . . . ) an address operable on a network. The assigned address is utilized by clients to transparently access the industrial control device over the network. Furthermore, the assigned address can be employed by the industrial control device to transparently access remote clients and servers.
According to one aspect of the subject invention, requests are transmitted to a PLC via a network. The requests are translated into the communication protocol used by the PLC backplane and routed over the backplane to the recipient module. In addition, the subject innovation provides systems and methods to prevent unauthorized requests from being made to a PLC module over the network by devices lacking proper access privileges. Similarly, in another aspect the PLC hosted applications and industrial control devices can transparently bridge or across the PLC backplane and reach internet and intranet based resources including web servers, file servers, databases, application servers and other devices or applications.
In another aspect of the subject invention, an industrial control device is assigned multiple addresses, one address for each sub-component or service included in the device. The addresses can be discovered so that clients can retrieve a list of all available devices and services and the network addresses corresponding to the devices and services. Additionally or alternatively, the nodes can announce themselves.
To the accomplishment of the foregoing and related ends, certain illustrative aspects of the claimed subject matter are described herein in connection with the following description and the annexed drawings. These aspects are indicative of various ways in which the subject matter may be practiced, all of which are intended to be within the scope of the claimed subject matter. Other advantages and novel features may become apparent from the following detailed description when considered in conjunction with the drawings.
The various aspects of the subject invention are now described with reference to the annexed drawings, wherein like numerals refer to like or corresponding elements throughout. It should be understood, however, that the drawings and detailed description relating thereto are not intended to limit the claimed subject matter to the particular form disclosed. Rather, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the claimed subject matter.
As used herein, the terms “component,” “system” and the like are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on computer and the computer can be a component. One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers.
The word “exemplary” is used herein to mean serving as an example, instance, or illustration. Any aspect or design described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other aspects or designs.
Furthermore, the disclosed subject matter may be implemented as a system, method, apparatus, or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof to control a computer or processor based device to implement aspects detailed herein. The term “article of manufacture” (or alternatively, “computer program product”) as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier, or media. For example, computer readable media can include but are not limited to magnetic storage devices (e.g., hard disk, floppy disk, magnetic strips . . . ), optical disks (e.g., compact disk (CD), digital versatile disk (DVD). . . ), smart cards, and flash memory devices (e.g., card, stick). Additionally it should be appreciated that a carrier wave can be employed to carry computer-readable electronic data such as those used in transmitting and receiving electronic mail or in accessing a network such as the Internet or a local area network (LAN). Of course, those skilled in the art will recognize many modifications may be made to this configuration without departing from the scope or spirit of the claimed subject matter.
Turning initially to
PLC 110 is communicatively coupled to network 104 by network module 114. I/O module 112 is associated with network module 114 such that requests made to or from I/O module 112 received on network 104 are forwarded by network module 114. A security component 116 is associated with or contained by PLC 110 and controls access to I/O module 112 identified by unique address 118 (e.g., EP address). It is to be appreciated that, while security component 116 is depicted as a distinct object, it may also be contained within I/O module 112 or network module 114 or distributed there between. Security component 116 controls access to I/O module 114 by acting as a firewall, acting as a Network Address Translation (NAT) device, authenticating a username and password, blocking unauthorized requests, ingress or egress filter, encryption/decryption functionality, federated security, map one security access mechanism credential to a more common format “single sign on” method used throughout the enterprise, among other things.
Client 102 communicates on network 104 through a router/switch 106. It is to be appreciated that the client 102 may not require the router/switch 106 in order to communicate on network 104. The client 102 can be a personal computer (PC), a human machine interface (HMI), another PLC, or other network connectible component. Client 102 can communicate with I/O module 112 over network 104 by accessing or addressing address 118 associated with the I/O module 112. Security component 116 ensures that client 102 can only communicate with I/O module 112 if it is authorized to do so by providing valid credentials (including federated security, e.g. single sign on services) or being configured correctly on the network 104.
Turning to
In
Turning now to
PLCs 410 and 420 include PLC devices or modules 412 and 422 respectively. For example, PLC devices 412 and 422 can be any type of PLC module (e.g. I/O, program, processor, etc.). PLC device 412 can transmit data to and receive data from network interfaces 414 and 416 over the backplane of PLC 410. Similarly, PLC device 422 can communicate with network interface 424 over the backplane of PLC 420. Data requests sent to PLC device 412 from HMI 402 and PC 404 on the first network 460 are forwarded to PLC device 412 by network interface 414 via the backplane. Requests sent from HMI 440 on the second network 460 to PLC 422 are routed over the backplane of PLC 420 by network interface 424. PC 404 and HMI 402 can send requests to PLC device 422 by forwarding the request from the first network 460 to the second network 460 through network interfaces 414 and 416.
PLC 430 includes an industrial protocol network interface 432 in addition to network interface 434. An industrial protocol device 436 is communicatively coupled to PLC 430 through the industrial protocol network interface 432. Data requests bound for industrial protocol device 436 from PC 404 and HMIs 402 and 440 is received by network interface 434. The request is forwarded over the backplane of PLC 430 to industrial protocol network interface 432 which then routes the request on the industrial protocol network to industrial protocol device 436. The response is returned on the industrial protocol network to industrial protocol network interface 432 where it is then forwarded over the backplane of PLC 430 to network interface 434. The response is transmitted on the second network 460 to data requestor or forwarded to the first network 450 via PLC 410.
Turning now to
PLC 510 is communicatively coupled to network 104 by network module 114. PLC module 512 is associated with network module 114 such that requests made to or from module 512 received on network 104 are forwarded by network module 114. A routing table 516 is employed by network module 114 to facilitate forwarding the request received on network 104. The routing table 516 contains a mapping of address 518 operable on network 104 to an industrial protocol ID or address. When an incoming request is sent from client 502 on network 104 to address 518, intended for module 512, the request is received by network module 114. Network module 114 looks up address 518 in routing table 516 and retrieves an industrial protocol ID or address which is then used to route the request to module 512. Similarly, when a request from module 512 is received by network module 114, the network module 114 accesses the routing table 516 to retrieve the address 518 associated with module 512. The network module uses the retrieved address to forward the request from module 512 to client 502 on network 104 such that it appears the request originated from address 518. In addition to the routing table component 516, there is a protocol component 520 that performs protocol translations between the industrial protocols and the respective Internet standard protocol. For example, there is a standard ICMP “ping” used to detect the presence of an Ethernet device. This “ping” service may be intercepted by device 114, to lookup a routing address via component 516, and then translate to the appropriate industrial protocol via component 520 equivalent to message with device 512. All these lookups and transformations are not detectable by the remote client 502.
Referring now to
Turning briefly to
Returning to
The aforementioned systems have been described with respect to interaction between several components. It should be appreciated that such systems and components can include those components or sub-components specified therein, some of the specified components or sub-components, and/or additional components. Sub-components could also be implemented as components communicatively coupled to other components rather than included within parent components. Additionally, it should be noted that one or more components and/or sub-components may be combined into a single component providing aggregate functionality. For instance, security component 116 could be incorporated within network module 114 or be communicative coupled thereto. The components may also interact with one or more other components not specifically described herein but known by those of skill in the art.
Furthermore, as will be appreciated, various portions of the disclosed systems above and methods below may include or consist of artificial intelligence or knowledge or rule based components, sub-components, processes, means, methodologies, or mechanisms (e.g., support vector machines, neural networks, expert systems, Bayesian belief networks, fuzzy logic, data fusion engines, classifiers . . . ). Such components, inter alia, can automate certain mechanisms or processes performed thereby to make portions of the systems and methods more adaptive as well as efficient and intelligent. For example, directory component 710 can employ artificial intelligent based components or systems to facilitate discovery and presentation of PLC modules and there addresses when they are connected to a network. In addition, security component 116 can employ one or more of the aforementioned components, mechanism, and the like to restrict or control access.
In view of the exemplary systems described supra, methodologies that may be implemented in accordance with the disclosed subject matter will be better appreciated with reference to the flow charts of
Additionally, it should be further appreciated that the methodologies disclosed hereinafter and throughout this specification are capable of being stored on an article of manufacture to facilitate transporting and transferring such methodologies to computers. The term article of manufacture, as used, is intended to encompass a computer program accessible from any computer-readable device, carrier, or media.
Turning now to
Referring now to
Turning now to
In order to provide a context for the various aspects of the disclosed subject matter,
With reference to
The system bus 1718 can be any of several types of bus structure(s) including the memory bus or memory controller, a peripheral bus or external bus, and/or a local bus using any variety of available bus architectures including, but not limited to, 11-bit bus, Industrial Standard Architecture (ISA), Micro-Channel Architecture (MSA), Extended ISA (EISA), Intelligent Drive Electronics (IDE), VESA Local Bus (VLB), Peripheral Component Interconnect (PCI), Universal Serial Bus (USB), Advanced Graphics Port (AGP), Personal Computer Memory Card International Association bus (PCMCIA), and Small Computer Systems Interface (SCSI).
The system memory 1716 includes volatile memory 1720 and nonvolatile memory 1722. The basic input/output system (BIOS), containing the basic routines to transfer information between elements within the computer 1712, such as during start-up, is stored in nonvolatile memory 1722. By way of illustration, and not limitation, nonvolatile memory 1722 can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory. Volatile memory 1720 includes random access memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).
Computer 1712 also includes removable/non-removable, volatile/non-volatile computer storage media.
It is to be appreciated that
A user enters commands or information into the computer 1712 through input device(s) 1736. Input devices 1736 include, but are not limited to, a pointing device such as a mouse, trackball, stylus, touch pad, keyboard, microphone, joystick, game pad, satellite dish, scanner, TV tuner card, digital camera, digital video camera, web camera, and the like. These and other input devices connect to the processing unit 1714 through the system bus 1718 via interface port(s) 1738. Interface port(s) 1738 include, for example, a serial port, a parallel port, a game port, and a universal serial bus (USB). Output device(s) 1740 use some of the same type of ports as input device(s) 1736. Thus, for example, a USB port may be used to provide input to computer 1712 and to output information from computer 1712 to an output device 1740. Output adapter 1742 is provided to illustrate that there are some output devices 1740 like displays (e.g., flat panel and CRT), speakers, and printers, among other output devices 1740 that require special adapters. The output adapters 1742 include, by way of illustration and not limitation, video and sound cards that provide a means of connection between the output device 1740 and the system bus 1718. It should be noted that other devices and/or systems of devices provide both input and output capabilities such as remote computer(s) 1144.
Computer 1712 can operate in a networked environment using logical connections to one or more remote computers, such as remote computer(s) 1744. The remote computer(s) 1744 can be a personal computer, a server, a router, a network PC, a workstation, a microprocessor based appliance, a peer device or other common network node and the like, and typically includes many or all of the elements described relative to computer 1712. For purposes of brevity, only a memory storage device 1746 is illustrated with remote computer(s) 1744. Remote computer(s) 1744 is logically connected to computer 1712 through a network interface 1748 and then physically connected via communication connection(s) 1750. Network interface 1748 encompasses communication networks such as local-area networks (LAN) and wide-area networks (WAN). LAN technologies include Fiber Distributed Data Interface (FDDI), Copper Distributed Data Interface (CDDI), Ethernet/IEEE 802.3, Token Ring/IEEE 802.5 and the like. WAN technologies include, but are not limited to, point-to-point links, circuit-switching networks like Integrated Services Digital Networks (ISDN) and variations thereon, packet switching networks, and Digital Subscriber Lines (DSL).
Communication connection(s) 1750 refers to the hardware/software employed to connect the network interface 1748 to the bus 1718. While communication connection 1750 is shown for illustrative clarity inside computer 1712, it can also be external to computer 1712. The hardware/software necessary for connection to the network interface 1748 includes, for exemplary purposes only, internal and external technologies such as, modems including regular telephone grade modems, cable modems, power modems and DSL modems, ISDN adapters, and Ethernet cards or components.
What has been described above includes examples of aspects of the claimed subject matter. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the claimed subject matter, but one of ordinary skill in the art may recognize that many further combinations and permutations of the disclosed subject matter are possible. Accordingly, the disclosed subject matter is intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims. Furthermore, to the extent that the terms “includes,” “has” or “having” are used in either the detailed description or the claims, such terms are intended to be inclusive in a manner similar to the term “comprising” as “comprising” is interpreted when employed as a transitional word in a claim.
Patent | Priority | Assignee | Title |
10375106, | Jan 13 2016 | National Technology & Engineering Solutions of Sandia, LLC | Backplane filtering and firewalls |
11109215, | Nov 21 2016 | BECKHOFF AUTOMATION GMBH | Controlling message transmission between communication subscribers in an automation system |
9032522, | Jul 23 2012 | National Technology & Engineering Solutions of Sandia, LLC | PLC backplane analyzer for field forensics and intrusion detection |
9600785, | Jan 31 2011 | International Business Machines Corporation | Automatically generated and updated graphical rendering of processes |
Patent | Priority | Assignee | Title |
4271505, | Jul 02 1979 | The Foxboro Company | Process communication link |
5131092, | Sep 01 1989 | SCHNEIDER AUTOMATION INC | Communication system enabling programmable logic controllers access to host computer tasks and host computer access to programmable logic controllers without polling |
5280480, | Feb 21 1991 | International Business Machines Corporation | Source routing transparent bridge |
5307463, | Mar 08 1990 | Allen-Bradley Company, Inc. | Programmable controller communication module |
6061603, | Sep 10 1997 | Schneider Automation Inc. | System for remotely accessing an industrial control system over a commercial communications network |
6321272, | |||
6560235, | Nov 16 1998 | Woodhead Industries, Inc. | Universal communication system |
6717382, | Mar 17 2000 | Keba AG | Method of connecting a mobile control and/or monitoring unit to a machine and a control and/or monitoring unit for same |
6883172, | Mar 29 2001 | Microsoft Technology Licensing, LLC | System and method for bridging managed and unmanaged object systems by utilizing an interface wrapper to facilitate transparent communications |
20020156837, | |||
20030034998, | |||
20040111512, | |||
20040204772, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Sep 12 2005 | Rockwell Automation Technologies, Inc. | (assignment on the face of the patent) | / | |||
Sep 12 2005 | CALLAGHAN, DAVID M | ROCKWELL AUTOMATION TECHNOLOGIES, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 016993 | /0839 |
Date | Maintenance Fee Events |
Jun 16 2014 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Jun 14 2018 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
May 19 2022 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
Date | Maintenance Schedule |
Dec 14 2013 | 4 years fee payment window open |
Jun 14 2014 | 6 months grace period start (w surcharge) |
Dec 14 2014 | patent expiry (for year 4) |
Dec 14 2016 | 2 years to revive unintentionally abandoned end. (for year 4) |
Dec 14 2017 | 8 years fee payment window open |
Jun 14 2018 | 6 months grace period start (w surcharge) |
Dec 14 2018 | patent expiry (for year 8) |
Dec 14 2020 | 2 years to revive unintentionally abandoned end. (for year 8) |
Dec 14 2021 | 12 years fee payment window open |
Jun 14 2022 | 6 months grace period start (w surcharge) |
Dec 14 2022 | patent expiry (for year 12) |
Dec 14 2024 | 2 years to revive unintentionally abandoned end. (for year 12) |